Re: [tsvwg] draft-ietf-udp-options issues from IETF 104

Joe Touch <touch@strayalpha.com> Tue, 16 July 2019 22:15 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E3E4120111 for <tsvwg@ietfa.amsl.com>; Tue, 16 Jul 2019 15:15:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.218
X-Spam-Level:
X-Spam-Status: No, score=-1.218 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bkn_rGQRFBsq for <tsvwg@ietfa.amsl.com>; Tue, 16 Jul 2019 15:15:22 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F16612011C for <tsvwg@ietf.org>; Tue, 16 Jul 2019 15:15:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=Message-ID:References:In-Reply-To:Subject:Cc: To:From:Date:Content-Type:MIME-Version:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=KbXf5xOvNTYoPdZUFq3Kgil2KzG1yzwiuhjLdIFguvY=; b=2B7gDqLHNkS5/sLvC3psQMj37 ENJchoENhlOf5zvnaxUc2Hme6KUBzrJBr7ki6amsuafEAqnoRKPxFoVGwryw74FehLeQHc60uaD9r AO1qM00mfDDxganTcYj1RjUdMUGyDfPDz6t7N1lLWoo4/FTcM1Ea4AvpTK9Qg58y3MOpNBw0LJxlV kViGbS5cGPbTDU8wJOWOmxUpb50kudjMBpJpvPO3Q5pOvn+3XcP73Uu+VO0iavKyLEppBL9FwmQtK do/PIqdkyKEC6jY7+KFj5UeHEymqMGD4nlpsBCZuKTfJlzLFBV9HhU2cZ7B0yJ0AFn8uLJQO67/M3 Ke5lgLVdw==;
Received: from [::1] (port=39178 helo=server217.web-hosting.com) by server217.web-hosting.com with esmtpa (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1hnVjB-00468p-Bl; Tue, 16 Jul 2019 18:15:21 -0400
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_f69e0b12a601b9f601edf18871c8214a"
Date: Tue, 16 Jul 2019 15:15:17 -0700
From: Joe Touch <touch@strayalpha.com>
To: Tom Herbert <tom@herbertland.com>
Cc: "C. M. Heard" <heard@pobox.com>, tsvwg <tsvwg@ietf.org>
In-Reply-To: <CALx6S37sZxmGQJq5mxDiF88NeUjj2HMRnQG5KyZA_4ujrLJkqg@mail.gmail.com>
References: <CAPDqMeq9GjEQKukH1pZOTdE50e_rc3U6gpdxT-5qrS5phD0RGw@mail.gmail.com> <646D45AD-D79B-4BD2-A084-7DA97CE2C415@strayalpha.com> <7EC37B50-45D5-4CF1-B113-205E55BF244E@strayalpha.com> <CALx6S34s7L7xo+26bt5Cdaqi4Es5Aci42GHk1WNKzugr5st-Gw@mail.gmail.com> <B525BF50-EFCC-44A5-A604-6CDDA914A1CB@strayalpha.com> <CAPDqMep3R6z9PRKkHyOvrh6sV9n5Sc0B++-zVz0FYJCwE6swrQ@mail.gmail.com> <E42A2AE2-F499-465E-BDE6-5EFC0AB20042@strayalpha.com> <CE03DB3D7B45C245BCA0D24327794936306138E9@MX307CL04.corp.emc.com> <CAPDqMeoyNb7vQTdqxLpZpnKb9S7QKeDJNLyQJBmq95yXhB+xfQ@mail.gmail.com> <7D365770-64FE-40BC-901D-B4D7DF6B484B@strayalpha.com> <20190713182554.GB39770@clarinet.employees.org> <CALx6S36mH2M6SYnRSecWXa7k_d1u8O43+CXE-=KqeO0x2e5+qw@mail.gmail.com> <82FF6486-FABF-4D2C-B5E2-178779C720A4@strayalpha.com> <30c17e9c174f6b0da3ecc6b503a8cb17@strayalpha.com> <CACL_3VGs7j+y5vFNT3OL9OKX8ue4rv-Cxi467KR-vbhnMdx86g@mail.gmail.com> <2f71a292f924a9b8de4227c4bbc2f809@strayalpha.com> <CACL_3VGrF5UnbVsSzZZoy1i57WKiQKBX2T3a16UyEVHY=Kr3XA@mail.gmail.com> <0ce46e21249f0dc55310b192d382f50a@strayalpha.com> <CALx6S36gaMqNRo_hYKr45T_vTkUB-vRrYRYJz2_KgvejNsJtLQ@mail.gmail.com> <efbf65646a0e0d2535dc5726b34f3472@strayalpha.com> <CALx6S37sZxmGQJq5mxDiF88NeUjj2HMRnQG5KyZA_4ujrLJkqg@mail.gmail.com>
Message-ID: <079d7d849d0e6260497a6c0ed37595a2@strayalpha.com>
X-Sender: touch@strayalpha.com
User-Agent: Roundcube Webmail/1.3.7
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/MMn_kl7SORYxPwwSp5NsRmaHxX4>
Subject: Re: [tsvwg] draft-ietf-udp-options issues from IETF 104
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2019 22:15:24 -0000

On 2019-07-16 15:06, Tom Herbert wrote:

> On Tue, Jul 16, 2019 at 2:44 PM Joe Touch <touch@strayalpha.com> wrote: 
> 
>> On 2019-07-16 14:37, Tom Herbert wrote:
>> 
>> On Tue, Jul 16, 2019 at 2:25 PM Joe Touch <touch@strayalpha.com> wrote:
>> 
>> ...
>> We CAN easily set a limit IF we went.
>> 
>> We don't need to design that into the protocol structure. And we don't need to start with something that already impacts things like fragmentation/reassembly, LITE, etc. where the final user data is inside the options area.
>> 
>> Additionally, the comparison to IP is misleading; these are endpoint options and should not have the same kinds of limits as per-hop.
> IPv6 has destination options for which limits are applied by Linux.

Linux is not an example of how to follow specs; if anything, it's THE
example to the contrary. 

>> Finally, the "realities of deployment" should not be designed or limited by what is currently available. UDP hasn't been updated in many decades; I hope we won't need to come back and re-do this in 5 years just because we're too focused on current technology.
> 
> Tell that to the IPv6 guys ;-) It has taken years to derive a
> deployable solution and that has included real world considerations
> like DOS. IMO, it is wise to learn from that experience.
> 
> Consider in the UDP options draft:
> 
> [NOTE: Tom Herbert suggested we declare "more than 3 consecutive
> NOPs" a fatal error to reduce the potential of using NOPs as a DOS
> attack, but IMO there are other equivalent ways (e.g., using
> RESERVED or other UNASSIGNED values) and the "no more than 3"
> creates its own DOS vulnerability)
> 
> Okay, so there is no limit to number of NOPs in a packet.

No, it's still under discussion. 

The problem is the cost of the limit creates its own DOS. 

> So per the
> draft we could full up an MTU or even a maximum size IP packet with
> NOPs. That's going to wreak havoc on a receiver and hence is a great
> DOS attack. If you don't believe, please run the experiment in your
> implemenation and see what happens to your CPU utilization.

Receivers can do whatever they want to check without us setting protocol
limits. 

A good implementation (of anything) checks resources and limits overuse.
Period. We should not need to set limits to make that happen. 

Besides, such limits *change over time and depend on a particular
system's resources* anyway. 

One size does not fit all for all time. 

Joe